首页 > 最新文献

2019 53rd Annual Conference on Information Sciences and Systems (CISS)最新文献

英文 中文
A Generative Adversarial Neural Network for Beamforming Ultrasound Images Invited Presentation 一种用于波束形成超声图像的生成对抗神经网络
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692835
A. Nair, T. Tran, A. Reiter, M. Bell
Plane wave ultrasound imaging is an ideal approach to achieve maximum real-time frame rates. However, multiple plane wave insonifications at different angles are often combined to improve image quality, reducing the throughput of the system. We are exploring deep learning-based ultrasound image formation methods as an alternative to this beamforming process by extracting critical information directly from raw radio-frequency channel data from a single plane wave insonification prior to the application of receive time delays. In this paper, we investigate a Generative Adversarial Network (GAN) architecture for the proposed task. This network was trained with over 50,000 FieldII simulations, each containing a single cyst in tissue insonified by a single plane wave. The GAN is trained to produce two outputs – a Deep Neural Network (DNN) B-mode image trained to match a Delay-and-Sum (DAS) beamformed B-mode image and a DNN segmentation trained to match the true segmentation of the cyst from surrounding tissue. We systematically investigate the benefits of feature sharing and discriminative loss during GAN training. Our overall best performing network architecture (with feature sharing and discriminative loss) obtained a PSNR score of 29.38 dB with the simulated test set and 14.86 dB with a tissue-mimicking phantom. The DSC scores were 0.908 and 0.79 for the simulated and phantom data, respectively. The successful translation of the feature representations learned by the GAN to phantom data demonstrates the promise that deep learning holds as an alternative to the traditional ultrasound information extraction pipeline.
平面波超声成像是实现最大实时帧率的理想方法。然而,不同角度的多个平面波失谐常常被组合在一起以提高图像质量,从而降低了系统的吞吐量。我们正在探索基于深度学习的超声图像形成方法,作为这种波束形成过程的替代方法,通过在应用接收时间延迟之前直接从单个平面波不相干的原始射频信道数据中提取关键信息。在本文中,我们研究了一种生成对抗网络(GAN)架构。该网络使用超过50,000个FieldII模拟进行训练,每个模拟都包含一个由单个平面波不超声的组织中的单个囊肿。GAN被训练产生两个输出——一个深度神经网络(DNN) b模式图像被训练以匹配延迟和求和(DAS)波束形成的b模式图像,一个DNN分割被训练以匹配囊肿与周围组织的真实分割。我们系统地研究了特征共享和判别损失在GAN训练中的好处。我们整体表现最好的网络架构(具有特征共享和判别损失)在模拟测试集获得了29.38 dB的PSNR分数,在组织模拟模型中获得了14.86 dB。模拟数据和模拟数据的DSC得分分别为0.908和0.79。GAN成功地将学习到的特征表示转换为幻影数据,这表明深度学习可以替代传统的超声信息提取管道。
{"title":"A Generative Adversarial Neural Network for Beamforming Ultrasound Images Invited Presentation","authors":"A. Nair, T. Tran, A. Reiter, M. Bell","doi":"10.1109/CISS.2019.8692835","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692835","url":null,"abstract":"Plane wave ultrasound imaging is an ideal approach to achieve maximum real-time frame rates. However, multiple plane wave insonifications at different angles are often combined to improve image quality, reducing the throughput of the system. We are exploring deep learning-based ultrasound image formation methods as an alternative to this beamforming process by extracting critical information directly from raw radio-frequency channel data from a single plane wave insonification prior to the application of receive time delays. In this paper, we investigate a Generative Adversarial Network (GAN) architecture for the proposed task. This network was trained with over 50,000 FieldII simulations, each containing a single cyst in tissue insonified by a single plane wave. The GAN is trained to produce two outputs – a Deep Neural Network (DNN) B-mode image trained to match a Delay-and-Sum (DAS) beamformed B-mode image and a DNN segmentation trained to match the true segmentation of the cyst from surrounding tissue. We systematically investigate the benefits of feature sharing and discriminative loss during GAN training. Our overall best performing network architecture (with feature sharing and discriminative loss) obtained a PSNR score of 29.38 dB with the simulated test set and 14.86 dB with a tissue-mimicking phantom. The DSC scores were 0.908 and 0.79 for the simulated and phantom data, respectively. The successful translation of the feature representations learned by the GAN to phantom data demonstrates the promise that deep learning holds as an alternative to the traditional ultrasound information extraction pipeline.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116007953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Distribution Estimation for Stochastic Approximation in Finite Samples Using A Surrogate Stochastic Differential Equation Method 有限样本随机逼近的代理随机微分方程分布估计
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693022
Shuyu Liu, Yingze Hou, J. Spall
Evaluating the statistical error in the estimate coming from a stochastic approximation (SA) algorithm is useful for confidence region calculation and the determination of stopping times. Robbins-Monro (RM) type stochastic gradient descent is a widely used method in SA. Knowledge of the probability distribution of the SA process is useful for error analysis. Currently, however, only the asymptotic distribution has been studied in this setting in asymptotic theories, while distribution functions in the finite-sample regime have not been clearly depicted. We developed a method to estimate the finite sample distribution based on a surrogate process. We described the stochastic gradient descent (SGD) process as a Euler-Maruyama (EM) scheme for some RM types of stochastic differential equations (SDEs). Weak convergence theory for EM schemes validates its surrogate property with a convergence in distribution sense. For the first time, we have shown that utilizing the solution of Fokker-Planck (FP) equation for the surrogate SDE is appropriate to characterize the evolution of the distribution function in SGD process.
评估随机逼近算法估计的统计误差对置信区域的计算和停止时间的确定是有用的。robins - monro (RM)型随机梯度下降法是应用广泛的随机梯度下降法。了解SA过程的概率分布对误差分析是有用的。然而,目前在渐近理论中只研究了这种情况下的渐近分布,而有限样本情况下的分布函数还没有得到清晰的描述。我们开发了一种基于代理过程估计有限样本分布的方法。我们将随机梯度下降(SGD)过程描述为一些RM类型的随机微分方程(SDEs)的Euler-Maruyama (EM)格式。EM格式的弱收敛理论在分布意义上证明了它的代理性质。我们首次证明了利用Fokker-Planck (FP)方程的解来表征SGD过程中分布函数的演化是合适的。
{"title":"Distribution Estimation for Stochastic Approximation in Finite Samples Using A Surrogate Stochastic Differential Equation Method","authors":"Shuyu Liu, Yingze Hou, J. Spall","doi":"10.1109/CISS.2019.8693022","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693022","url":null,"abstract":"Evaluating the statistical error in the estimate coming from a stochastic approximation (SA) algorithm is useful for confidence region calculation and the determination of stopping times. Robbins-Monro (RM) type stochastic gradient descent is a widely used method in SA. Knowledge of the probability distribution of the SA process is useful for error analysis. Currently, however, only the asymptotic distribution has been studied in this setting in asymptotic theories, while distribution functions in the finite-sample regime have not been clearly depicted. We developed a method to estimate the finite sample distribution based on a surrogate process. We described the stochastic gradient descent (SGD) process as a Euler-Maruyama (EM) scheme for some RM types of stochastic differential equations (SDEs). Weak convergence theory for EM schemes validates its surrogate property with a convergence in distribution sense. For the first time, we have shown that utilizing the solution of Fokker-Planck (FP) equation for the surrogate SDE is appropriate to characterize the evolution of the distribution function in SGD process.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beam Management in 5G NR using Geolocation Side Information 使用地理位置侧信息的5G NR波束管理
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692820
Marius Arvinte, Marcos Tavares, D. Samardzija
A machine learning solution leveraging geolocation side information is proposed for enhancing beam management in 5G NR millimeter wave (mmWave) wireless systems. An important building block of our solution are the support vector machines (SVMs), which are used to model the mapping between the user equipments’ (UEs) geolocations and their serving beams/cells in a multiuser, multi-cell environment. Building upon the SVM models mentioned above, we introduce a multiuser scheduling algorithm that uses local beam assignment information from the cells adjacent to the users to reduce the amount of required real time channel state information (CSI) feedback. Simulations carried out using a realistic antenna array radiation pattern, as well as, data from a ray tracing channel model in a dense urban mmWave deployment show that the proposed multiuser scheduler has remarkably good performance, while its algorithmic complexity is kept low. We further quantify the improvements that our SVM-based beam management methods enable by comparison against the conventional exhaustive beam sweeping approach typically employed by 5G NR mmWave implementations. In this case, we show that our proposal enables the network to achieve a 50% reduction in initial access latency at a fixed signaling overhead, or 34% reduction of signaling overhead at a fixed latency requirement.
为了加强5G NR毫米波(mmWave)无线系统的波束管理,提出了一种利用地理位置侧信息的机器学习解决方案。我们解决方案的一个重要组成部分是支持向量机(svm),它用于在多用户、多小区环境中对用户设备(ue)的地理位置与其服务波束/小区之间的映射进行建模。在上述SVM模型的基础上,我们引入了一种多用户调度算法,该算法使用来自用户相邻单元的本地波束分配信息来减少所需的实时信道状态信息(CSI)反馈量。利用真实的天线阵列辐射方向图以及密集城市毫米波部署中的射线跟踪信道模型进行的仿真表明,所提出的多用户调度程序具有非常好的性能,同时其算法复杂度保持在较低水平。通过与5G NR毫米波实现通常采用的传统穷举波束扫描方法进行比较,我们进一步量化了基于svm的波束管理方法所带来的改进。在这种情况下,我们表明我们的建议使网络能够在固定的信令开销下实现50%的初始访问延迟减少,或者在固定的延迟要求下实现34%的信令开销减少。
{"title":"Beam Management in 5G NR using Geolocation Side Information","authors":"Marius Arvinte, Marcos Tavares, D. Samardzija","doi":"10.1109/CISS.2019.8692820","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692820","url":null,"abstract":"A machine learning solution leveraging geolocation side information is proposed for enhancing beam management in 5G NR millimeter wave (mmWave) wireless systems. An important building block of our solution are the support vector machines (SVMs), which are used to model the mapping between the user equipments’ (UEs) geolocations and their serving beams/cells in a multiuser, multi-cell environment. Building upon the SVM models mentioned above, we introduce a multiuser scheduling algorithm that uses local beam assignment information from the cells adjacent to the users to reduce the amount of required real time channel state information (CSI) feedback. Simulations carried out using a realistic antenna array radiation pattern, as well as, data from a ray tracing channel model in a dense urban mmWave deployment show that the proposed multiuser scheduler has remarkably good performance, while its algorithmic complexity is kept low. We further quantify the improvements that our SVM-based beam management methods enable by comparison against the conventional exhaustive beam sweeping approach typically employed by 5G NR mmWave implementations. In this case, we show that our proposal enables the network to achieve a 50% reduction in initial access latency at a fixed signaling overhead, or 34% reduction of signaling overhead at a fixed latency requirement.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"25 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132089936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Length-Compatible Polar Codes: A Survey : (Invited Paper) 长度相容极性码:概览:(特邀论文)
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692789
Thibaud Tonnellier, Adam Cavatassi, W. Gross
Polar codes natively lack the flexibility that is desired for practical application. Namely, Arikan’s polar code definition can only achieve code lengths that are powers of two. Rate-matching techniques, known as puncturing and shortening, have been applied to polar codes to grant a flexible block length. By considering polarizing kernels of alternate dimensions, Multi-kernel polar codes improve natural block length flexibility. With the recent advent of the 3GPP 5th generation New Radio specification, there now exists an industry standard for length-flexible polar codes. This paper outlines various state-of-the-art flexible polar coding schemes, such as puncturing, shortening, and multi-kernel construction, and evaluates their efficacy with respect to the newly designed 3GPP standard. Simulations and an in-depth analysis are presented.
极性码本身缺乏实际应用所需的灵活性。也就是说,Arikan的极坐标码定义只能实现2的幂的码长。速率匹配技术,称为穿刺和缩短,已应用于极性码授予灵活的块长度。通过考虑交替维数的极化核,多核极化码提高了自然块长度的灵活性。随着最近3GPP第5代新无线电规范的出现,现在存在一个长度灵活的极性代码的行业标准。本文概述了各种最先进的柔性极性编码方案,如穿刺、缩短和多核结构,并评估了它们相对于新设计的3GPP标准的有效性。给出了仿真和深入分析。
{"title":"Length-Compatible Polar Codes: A Survey : (Invited Paper)","authors":"Thibaud Tonnellier, Adam Cavatassi, W. Gross","doi":"10.1109/CISS.2019.8692789","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692789","url":null,"abstract":"Polar codes natively lack the flexibility that is desired for practical application. Namely, Arikan’s polar code definition can only achieve code lengths that are powers of two. Rate-matching techniques, known as puncturing and shortening, have been applied to polar codes to grant a flexible block length. By considering polarizing kernels of alternate dimensions, Multi-kernel polar codes improve natural block length flexibility. With the recent advent of the 3GPP 5th generation New Radio specification, there now exists an industry standard for length-flexible polar codes. This paper outlines various state-of-the-art flexible polar coding schemes, such as puncturing, shortening, and multi-kernel construction, and evaluates their efficacy with respect to the newly designed 3GPP standard. Simulations and an in-depth analysis are presented.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129826878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Error Estimation for the Particle Filter 粒子滤波的误差估计
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693032
Ziyu Liu, J. Spall
The particle filter is a popular algorithm for solving the state-space problem for its easy implement. Many previous studies have been conducted to study the asymptotical behavior of particle filters. In our previous works, we divided the error of particle filter into two parts. By using Lindeberg’s central limit theorem, we showed that one of them is asymptotically normal. However, it’s hard to estimate the covariance matrix of it’s converged distribution. This paper aims at giving a computable estimator for the covariance matrix.
粒子滤波因其易于实现而成为求解状态空间问题的常用算法。前人对粒子滤波器的渐近特性进行了大量的研究。在我们之前的工作中,我们将粒子滤波的误差分为两部分。利用Lindeberg中心极限定理,证明了其中一个是渐近正态的。然而,它的收敛分布的协方差矩阵很难估计。本文旨在给出协方差矩阵的一个可计算估计量。
{"title":"Error Estimation for the Particle Filter","authors":"Ziyu Liu, J. Spall","doi":"10.1109/CISS.2019.8693032","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693032","url":null,"abstract":"The particle filter is a popular algorithm for solving the state-space problem for its easy implement. Many previous studies have been conducted to study the asymptotical behavior of particle filters. In our previous works, we divided the error of particle filter into two parts. By using Lindeberg’s central limit theorem, we showed that one of them is asymptotically normal. However, it’s hard to estimate the covariance matrix of it’s converged distribution. This paper aims at giving a computable estimator for the covariance matrix.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence 基于出现频率和共现频率的机器学习XSS攻击分类
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693047
Sota Akaishi, R. Uda
Cross site scripting (XSS) attack is one of the attacks on the web. It brings session hijack with HTTP cookies, information collection with fake HTML input form and phishing with dummy sites. As a countermeasure of XSS attack, machine learning has attracted a lot of attention. There are existing researches in which SVM, Random Forest and SCW are used for the detection of the attack. However, in the researches, there are problems that the size of data set is too small or unbalanced, and that preprocessing method for vectorization of strings causes misclassification. The highest accuracy of the classification was 98% in existing researches. Therefore, in this paper, we improved the preprocessing method for vectorization by using word2vec to find the frequency of appearance and co-occurrence of the words in XSS attack scripts. Moreover, we also used a large data set to decrease the deviation of the data. Furthermore, we evaluated the classification results with two procedures. One is an inappropriate procedure which some researchers tend to select by mistake. The other is an appropriate procedure which can be applied to an attack detection filter in the real environment.
跨站脚本攻击(XSS)是网络攻击的一种。它带来会话劫持与HTTP cookie,信息收集与假HTML输入表单和网络钓鱼与假网站。机器学习作为跨站攻击的一种对策,受到了广泛的关注。已有研究将SVM、Random Forest和SCW用于攻击检测。然而,在研究中存在数据集规模过小或不平衡、字符串矢量化预处理方法导致误分类等问题。现有研究中,该分类的最高准确率为98%。因此,本文对矢量化预处理方法进行了改进,利用word2vec来查找跨站攻击脚本中单词的出现频率和共现频率。此外,我们还使用了一个大的数据集来减少数据的偏差。此外,我们用两种方法评估分类结果。一是一些研究人员往往错误地选择了不适当的程序。另一个是一个适当的程序,可以应用到一个攻击检测过滤器在实际环境中。
{"title":"Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence","authors":"Sota Akaishi, R. Uda","doi":"10.1109/CISS.2019.8693047","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693047","url":null,"abstract":"Cross site scripting (XSS) attack is one of the attacks on the web. It brings session hijack with HTTP cookies, information collection with fake HTML input form and phishing with dummy sites. As a countermeasure of XSS attack, machine learning has attracted a lot of attention. There are existing researches in which SVM, Random Forest and SCW are used for the detection of the attack. However, in the researches, there are problems that the size of data set is too small or unbalanced, and that preprocessing method for vectorization of strings causes misclassification. The highest accuracy of the classification was 98% in existing researches. Therefore, in this paper, we improved the preprocessing method for vectorization by using word2vec to find the frequency of appearance and co-occurrence of the words in XSS attack scripts. Moreover, we also used a large data set to decrease the deviation of the data. Furthermore, we evaluated the classification results with two procedures. One is an inappropriate procedure which some researchers tend to select by mistake. The other is an appropriate procedure which can be applied to an attack detection filter in the real environment.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Asymptotic Limits of Privacy in Bayesian Time Series Matching 贝叶斯时间序列匹配中隐私的渐近极限
Pub Date : 2019-02-18 DOI: 10.1109/CISS.2019.8692936
Nazanin Takbiri, D. Goeckel, A. Houmansadr, H. Pishro-Nik
Various modern and highly popular applications make use of user data traces in order to offer specific services, often for the purpose of improving the user’s experience while using such applications. However, even when user data is privatized by employing privacy-preserving mechanisms (PPM), users’ privacy may still be compromised by an external party who leverages statistical matching methods to match users’ traces with their previous activities. In this paper, we obtain the theoretical bounds on user privacy for situations in which user traces are matchable to sequences of prior behavior, despite anonymization of data time series. We provide both achievability and converse results for the case where the data trace of each user consists of independent and identically distributed (i.i.d.) random samples drawn from a multinomial distribution, as well as the case that the users’ data points are dependent over time and the data trace of each user is governed by a Markov chain model.
各种现代和非常流行的应用程序利用用户数据跟踪来提供特定的服务,通常是为了改善用户在使用这些应用程序时的体验。然而,即使通过使用隐私保护机制(PPM)将用户数据私人化,用户的隐私仍然可能受到外部方的损害,外部方利用统计匹配方法将用户的痕迹与其以前的活动进行匹配。在本文中,我们获得了用户跟踪与先前行为序列匹配的情况下的用户隐私的理论界限,尽管数据时间序列是匿名的。对于每个用户的数据轨迹由从多项分布中抽取的独立和同分布(i.i.d)随机样本组成的情况,以及用户的数据点随时间而依赖并且每个用户的数据轨迹由马尔可夫链模型控制的情况,我们提供了可实现性和相反的结果。
{"title":"Asymptotic Limits of Privacy in Bayesian Time Series Matching","authors":"Nazanin Takbiri, D. Goeckel, A. Houmansadr, H. Pishro-Nik","doi":"10.1109/CISS.2019.8692936","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692936","url":null,"abstract":"Various modern and highly popular applications make use of user data traces in order to offer specific services, often for the purpose of improving the user’s experience while using such applications. However, even when user data is privatized by employing privacy-preserving mechanisms (PPM), users’ privacy may still be compromised by an external party who leverages statistical matching methods to match users’ traces with their previous activities. In this paper, we obtain the theoretical bounds on user privacy for situations in which user traces are matchable to sequences of prior behavior, despite anonymization of data time series. We provide both achievability and converse results for the case where the data trace of each user consists of independent and identically distributed (i.i.d.) random samples drawn from a multinomial distribution, as well as the case that the users’ data points are dependent over time and the data trace of each user is governed by a Markov chain model.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal Sensor Placement for Topology Identification in Smart Power Grids 面向智能电网拓扑识别的传感器优化布局
Pub Date : 2019-01-30 DOI: 10.1109/CISS.2019.8692792
Ananth Narayan Samudrala, M. Amini, S. Kar, Rick S. Blum
Accurate network topology information is critical for secure operation of smart power distribution systems. Line outages can change the operational topology of a distribution network. As a result, topology identification by detecting outages is an important task to avoid mismatch between the topology that the operator believes is present and the actual topology. Power distribution systems are operated as radial trees and are recently adopting the integration of sensors to monitor the network in real time. In this paper, an optimal sensor placement solution is proposed that enables outage detection through statistical tests based on sensor measurements. Using two types of sensors, node sensors and line sensors, we propose a novel formulation for the optimal sensor placement as a cost optimization problem with binary decision variables, i.e., to place or not place a sensor at each bus/line. The advantage of the proposed placement strategy for outage detection is that it incorporates various types of sensors, is independent of load forecast statistics and is cost effective. Numerical results illustrating the placement solution are presented.
准确的网络拓扑信息对智能配电系统的安全运行至关重要。线路中断可以改变配电网络的运行拓扑结构。因此,通过检测中断来进行拓扑识别是一项重要的任务,以避免操作员认为存在的拓扑与实际拓扑之间的不匹配。配电系统以放射状树的方式运行,最近采用传感器集成来实时监控网络。本文提出了一种基于传感器测量值的统计测试来实现停机检测的传感器最优放置方案。使用两种类型的传感器,节点传感器和线路传感器,我们提出了一种新的最优传感器放置公式,作为一个具有二元决策变量的成本优化问题,即在每条总线/线路上放置或不放置传感器。所提出的停机检测放置策略的优点是它包含了各种类型的传感器,不依赖于负荷预测统计,并且具有成本效益。给出了数值结果,说明了该布局方案的可行性。
{"title":"Optimal Sensor Placement for Topology Identification in Smart Power Grids","authors":"Ananth Narayan Samudrala, M. Amini, S. Kar, Rick S. Blum","doi":"10.1109/CISS.2019.8692792","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692792","url":null,"abstract":"Accurate network topology information is critical for secure operation of smart power distribution systems. Line outages can change the operational topology of a distribution network. As a result, topology identification by detecting outages is an important task to avoid mismatch between the topology that the operator believes is present and the actual topology. Power distribution systems are operated as radial trees and are recently adopting the integration of sensors to monitor the network in real time. In this paper, an optimal sensor placement solution is proposed that enables outage detection through statistical tests based on sensor measurements. Using two types of sensors, node sensors and line sensors, we propose a novel formulation for the optimal sensor placement as a cost optimization problem with binary decision variables, i.e., to place or not place a sensor at each bus/line. The advantage of the proposed placement strategy for outage detection is that it incorporates various types of sensors, is independent of load forecast statistics and is cost effective. Numerical results illustrating the placement solution are presented.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Spatially Coupled LDPC Codes and the Multiple Access Channel 空间耦合LDPC码与多址信道
Pub Date : 2019-01-17 DOI: 10.1109/CISS.2019.8692899
Sebastian Cammerer, Xiaojie Wang, Yingyan Ma, S. Brink
We consider spatially coupled low-density parity-check (SC-LDPC) codes within a non-orthogonal interleave division multiple access (IDMA) scheme to avoid cumbersome degree profile matching of the LDPC code components to the iterative multi-user detector (MUD). Besides excellent decoding thresholds, the approach benefits from the possibility of using rather simple and regular underlying block LDPC codes owing to the universal behavior of the resulting coupled code with respect to the channel front-end, i.e., the iterative MUD. Furthermore, an additional outer repetition code makes the scheme flexible to cope with a varying number of users and user rates, as the SC-LDPC itself can be kept constant for a wide range of different user loads. The decoding thresholds are obtained via density evolution (DE) and verified by bit error rate (BER) simulations. To keep decoding complexity and latency small, we introduce a joint iterative windowed detector/decoder imposing carefully adjusted sub-block interleavers. Finally, we show that the proposed coding scheme also works for Rayleigh channels using the same code with tolerable performance loss compared to the additive white Gaussian noise (AWGN) channel.
为了避免LDPC码分量与迭代多用户检测器(MUD)的繁琐度轮廓匹配,我们在非正交交错分多址(IDMA)方案中考虑了空间耦合低密度奇偶校验(SC-LDPC)码。除了出色的解码阈值外,该方法还受益于使用相当简单和规则的底层块LDPC码的可能性,因为所得到的耦合码相对于信道前端(即迭代MUD)具有通用行为。此外,额外的外部重复码使方案灵活地应对不同数量的用户和用户速率,因为SC-LDPC本身可以在大范围的不同用户负载下保持不变。解码阈值通过密度演化(DE)得到,并通过误码率(BER)仿真进行验证。为了保持解码的复杂性和延迟小,我们引入了一个联合迭代的窗口检测器/解码器,施加精心调整的子块交织器。最后,我们证明了所提出的编码方案也适用于瑞利信道,使用相同的编码,与加性高斯白噪声(AWGN)信道相比,性能损失可以容忍。
{"title":"Spatially Coupled LDPC Codes and the Multiple Access Channel","authors":"Sebastian Cammerer, Xiaojie Wang, Yingyan Ma, S. Brink","doi":"10.1109/CISS.2019.8692899","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692899","url":null,"abstract":"We consider spatially coupled low-density parity-check (SC-LDPC) codes within a non-orthogonal interleave division multiple access (IDMA) scheme to avoid cumbersome degree profile matching of the LDPC code components to the iterative multi-user detector (MUD). Besides excellent decoding thresholds, the approach benefits from the possibility of using rather simple and regular underlying block LDPC codes owing to the universal behavior of the resulting coupled code with respect to the channel front-end, i.e., the iterative MUD. Furthermore, an additional outer repetition code makes the scheme flexible to cope with a varying number of users and user rates, as the SC-LDPC itself can be kept constant for a wide range of different user loads. The decoding thresholds are obtained via density evolution (DE) and verified by bit error rate (BER) simulations. To keep decoding complexity and latency small, we introduce a joint iterative windowed detector/decoder imposing carefully adjusted sub-block interleavers. Finally, we show that the proposed coding scheme also works for Rayleigh channels using the same code with tolerable performance loss compared to the additive white Gaussian noise (AWGN) channel.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Note on the Estimation Method of Intervention Effects based on Statistical Decision Theory 基于统计决策理论的干预效果估计方法述评
Pub Date : 2019-01-16 DOI: 10.1109/CISS.2019.8692816
S. Horii, T. Suko
In this paper, we deal with the problem of estimating the intervention effect in the statistical causal analysis using the structural equation model and the causal diagram. The intervention effect is defined as a causal effect on the response variable Y when the causal variable X is fixed to a certain value by an external operation and is defined based on the causal diagram. The intervention effect is defined as a function of the probability distributions in the causal diagram, however, generally these probability distributions are unknown, so it is required to estimate them from data. In other words, the steps of the estimation of the intervention effect using the causal diagram are as follows: 1. Estimate the causal diagram from the data, 2. Estimate the probability distributions in the causal diagram from the data, 3. Calculate the intervention effect. However, if the problem of estimating the intervention effect is formulated in the statistical decision theory framework, estimation with this procedure is not necessarily optimal. In this study, we formulate the problem of estimating the intervention effect for the two cases, the case where the causal diagram is known and the case where it is unknown, in the framework of statistical decision theory and derive the optimal decision method under the Bayesian criterion. We show the effectiveness of the proposed method through numerical simulations.
本文利用结构方程模型和因果图,讨论了统计因果分析中干预效果的估计问题。干预效应定义为当因果变量X被外部操作固定到一定值时,对响应变量Y产生的因果效应,根据因果图进行定义。干预效应被定义为因果图中概率分布的函数,但通常这些概率分布是未知的,因此需要从数据中进行估计。也就是说,利用因果图估计干预效果的步骤如下:1。从数据中估计因果关系图,2。从数据中估计因果图中的概率分布。计算干预效果。然而,如果在统计决策理论框架中制定干预效果的估计问题,那么用这种方法进行估计并不一定是最优的。在本研究中,我们在统计决策理论的框架下,提出了因果图已知和未知两种情况下的干预效果估计问题,并推导出贝叶斯准则下的最优决策方法。通过数值仿真验证了该方法的有效性。
{"title":"A Note on the Estimation Method of Intervention Effects based on Statistical Decision Theory","authors":"S. Horii, T. Suko","doi":"10.1109/CISS.2019.8692816","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692816","url":null,"abstract":"In this paper, we deal with the problem of estimating the intervention effect in the statistical causal analysis using the structural equation model and the causal diagram. The intervention effect is defined as a causal effect on the response variable Y when the causal variable X is fixed to a certain value by an external operation and is defined based on the causal diagram. The intervention effect is defined as a function of the probability distributions in the causal diagram, however, generally these probability distributions are unknown, so it is required to estimate them from data. In other words, the steps of the estimation of the intervention effect using the causal diagram are as follows: 1. Estimate the causal diagram from the data, 2. Estimate the probability distributions in the causal diagram from the data, 3. Calculate the intervention effect. However, if the problem of estimating the intervention effect is formulated in the statistical decision theory framework, estimation with this procedure is not necessarily optimal. In this study, we formulate the problem of estimating the intervention effect for the two cases, the case where the causal diagram is known and the case where it is unknown, in the framework of statistical decision theory and derive the optimal decision method under the Bayesian criterion. We show the effectiveness of the proposed method through numerical simulations.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130211740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 53rd Annual Conference on Information Sciences and Systems (CISS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1